Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Face Manipulation Detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(1/120)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Future trends in digital face manipulation and detection
Tolosana, Ruben
;
Rathgeb, Christian
;
Vera-Rodriguez, Ruben
;
Busch, Christoph
;
Verdoliva, Luisa
;
Lyu, Siwei
;
Nguyen, Huy H.
;
Yamagishi, Junichi
;
Echizen, Isao
;
Rot, Peter
;
Grm, Klemen
;
Štruc, Vitomir
;
Dantcheva, Antitza
;
Akhtar, Zahid
;
Romero-Tapiador, Sergio
;
Fierrez, Julian
;
Morales, Aythami
;
Ortega-Garcia, Javier
;
Kindt, Els
;
Jasserand, Catherine
;
Kalvet, Tarmo
;
Tiits, Marek
Handbook of digital face manipulation and detection : from deepfakes to morphing attacks
2022
/
p. 463-482 : ill
https://doi.org/10.1007/978-3-030-87664-7_21
book article
2
book article
Promises, social, and ethical challenges with biometrics in remote identity onboarding
Laas-Mikko, Katrin
;
Kalvet, Tarmo
;
Derevski, Robert
;
Tiits, Marek
Handbook of digital face manipulation and detection : from deepfakes to morphing attacks
2022
/
p. 437-462 : ill
https://doi.org/10.1007/978-3-030-87664-7_20
book article
Number of records 2, displaying
1 - 2
keyword
120
1.
Face Manipulation Detection
2.
face detection
3.
grain size manipulation
4.
manipulation
5.
opinion manipulation
6.
profit manipulation
7.
social manipulation
8.
FACE
9.
face masks
10.
face recognition
11.
front-face fluorescence
12.
amoxicillin detection
13.
anomaly detection
14.
anomaly detection for system logs
15.
antibiotic detection
16.
antibiotics detection
17.
aspect detection
18.
asynchronous fault detection
19.
attack detection
20.
barotrauma detection system
21.
behaviour-based intrusion detection systems
22.
body detection
23.
botnet detection
24.
capacitively coupled conductivity detection
25.
change detection
26.
chemical detection
27.
community detection
28.
compu ter-aided detection(CAD)
29.
computer-aided detection
30.
computer‐aided detection
31.
contactless conductivity detection
32.
contactless conductivity detection (C4D)
33.
crack detection
34.
crash detection
35.
cyber intrusion detection
36.
defect detection
37.
detection
38.
detection efficiency
39.
detection engineering
40.
detection method
41.
detection methods
42.
detection of anomalous end user nodes
43.
detection of hydrogen isotopes
44.
distributed detection
45.
early detection
46.
early intrusion detection
47.
energy detection
48.
error detection
49.
ESI-MS and IM detection
50.
Event detection
51.
extraction and detection methods
52.
failure detection
53.
fall detection
54.
fault detection
55.
fault detection and diagnoses
56.
fault detection and diagnosis
57.
Fish detection
58.
fouling detection
59.
harmonic detection
60.
hepatitis C virus (HCV) detection
61.
hubs detection
62.
IED detection
63.
image-based crack detection
64.
indicident detection and response
65.
indirect UV absorbance detection
66.
intrusion detection
67.
intrusion detection system
68.
intrusion detection system (IDS)
69.
intrusion detection systems
70.
island detection
71.
islanding detection
72.
label-free detection
73.
LED fluorescence detection
74.
leg detection
75.
light detection and ranging
76.
light detection and ranging (LiDAR)
77.
Light Detection and Ranging (LiDAR) point cloud
78.
limit of detection
79.
lock-in detection
80.
loop-closure detection
81.
malware detection
82.
marker detection
83.
mobile malware detection
84.
money laundering detection systems
85.
monitoring and detection
86.
multi-classed object detection
87.
Multi-valued Simulation for Hazard Detection in Digital Circuits
88.
mutant detection
89.
network anomaly detection
90.
network intrusion detection system
91.
nodules detection
92.
object detection
93.
oil-spill detection
94.
outlier’s detection methods
95.
outliers detection
96.
peak detection
97.
phytoplankton detection methods
98.
plagiarism detection
99.
position detection
100.
precursor detection
101.
protein detection
102.
proton detection
103.
radar detection
104.
ramp event detection
105.
recycled FPGA detection
106.
residual current detection
107.
robust detection
108.
scene text detection
109.
short-circuit detection
110.
small molecule detection
111.
speech activity detection
112.
Suicidal ideation detection
113.
synchronous detection
114.
tyre detection
115.
unmanned aerial vehicle detection systems
116.
unsupervised outlier detection
117.
UV detection
118.
vehicle detection
119.
vortex detection
120.
3D lane detection
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT